How do enterprises implement patents, and what are the skills and tricks to apply for patent implementation?

20 19 the latest five-step patent mining technique is now shared with you! You can learn about it!

Step 1: List the new functions that can be realized in this project.

The new function here refers to the function that has not been realized in the conventional sense, and also refers to the function with better realization effect compared with the prior art.

In the specific operation, it is particularly important to note that the functions listed should be as specific as possible, and should be implemented in the sub-functions that each component in a project can achieve, instead of using general and overall functions as the object of subsequent analysis.

Step 2: Analyze the new function and preliminarily judge the patentability of this function.

The idea of analysis here is: for a function, analyze why the existing technology can not be realized and how the invention is realized.

Step 3: Get the scheme to be protected through functional splitting.

After determining that some functions can be converted into patents for protection through the previous steps, we need to split the functions and get the scheme that needs protection. The principle of splitting is to judge whether a technical point to realize this function can be applied independently and whether it has a separate protection value. For the inventor, it is only necessary to judge whether it can be used alone. As for the protection value, it can be confirmed with the assistance of the company's legal staff or agency.

Step 4: preliminarily judge whether the scheme belongs to the object that can be protected.

After the excavation and screening in the previous way, we also need to pay attention to that some schemes cannot be authorized because they do not meet the requirements of patent protection objects, or obviously do not meet the requirements of novelty and creativity. After determining the scheme to be protected, we need to verify whether it belongs to the object that can be protected.

Step 5: For the scheme to be protected, write the disclosure according to the corresponding protection type.